About your Search

20130416
20130424
Search Results 0 to 0 of about 1
analysts are doing right now backed in their headquarters. they're using very cutting edge technological tools to mine any of the data that they are able to pull from the first suspect who was killed early this morning. so his travel records, phone records, anything that they could look at, social security number to figure out who might be in the ever-expanding circle of people who knew him. these cutting edge tools would also look on the internet. did these individuals and this is a new thing that happened post-9/11 is that when you are confronted with a potential terrorism threat and knew the individual the first thing you did was go to social media, check on facebook, check on, you know, twitter. >> speak of twitter, the boston police department just tweeted an hour ago, an alert to the media not to disclose the tactical information to compromise officer safety with the homes that are being searched. there are a lot of crews up in boston and a lot of people covering this and a lot of risks in there. >> with the fact that the individuals had ieds with them overnight and were throwing t
Search Results 0 to 0 of about 1

Terms of Use (10 Mar 2001)